|
[1].G. Canfora, A. Cimitile, U. De Carlini, and A. De Lucia, "An Extensible System for Source Code Analysis," in IEEE Transactions on Software Engineering, pp. 721-740, 1998. [2].S. Schleimer, D.S. Wilkerson, and A. Aiken, "Winnowing: Local Algorithms for Document Fingerprinter, " in Proceedings of ACM SIGMOD Conference, pp. 76-85, 2003. [3].C. Liu, C. Chen, J. Han, and P. Yu, "GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis," in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 872-881, 2006. [4].L. Prechelt, G. Malpohl, and M. Philippsen, "Finding Plagiarism among a Set of Programs with Jplag," in Journal of Universal Computer Science, 8 (11), pp. 1016-1038, 2002. [5].T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code," in IEEE Transactions on Software Engineering, pp. 654-670, 2002. [6].J. Y. Kuo, and L. Chu, "Intelligent Code Analyzer for Online Course Management System," in Proceedings of the 3rd ACIS International Conference on Software Engineering Research, Management & Applications, pp. 228-234, 2005. [7].J. Y. Kuo, and F. C. Huang, "Code Analyzer for an Online Course Management System," in Journal of Systems and Software, pp. 2478-2486, 2010. [8].S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," in IEEE Transactions on Software Engineering 33 (9), 577-591, 2007. [9].R. Koschke, "Survey of Research on Software Clones," in Duplication, Redundancy, and Similarity in Software, Dagstuhl Seminar Proceedings, 2007. [10].J.H. Johnson, "Substring Matching for Clone Detection and Change Tracking," in Proceedings of the 10th International Conference on Software Maintenance, Victoria, British Columbia, Canada, pp. 120-126, 1994. [11].S. Horwitz, "Identifying the Semantic and Textual Differences Between Two Versions of a Program," in Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation, pp. 234-245, 1990. [12].I. D. Baxter, A. Yahin, L. Moura, M. Sant’Anna, and L. Bier, "Clone Detection Using Abstract Syntax Trees," in Proceedings of the 14th International Conference on Software Maintenance, Bethesda, Maryland, pp. 368-378, 1998. [13].V. Wahler, D. Seipel, J.W. Gudenberg, and G. Fischer, "Clone Detection in Source Code by Frequent Itemset Techniques," in Proceedings of the 4th IEEE International Workshop Source Code Analysis and Manipulation, Chicago, pp. 128-135, 2004. [14].R. Tairas, and J. Gray, "Phoenix-Based Clone Detection Using Suffix Trees," in Proceedings of the 44th Annual Southeast Regional Conference, Melbourne, Florida, pp. 679-684, 2006. [15].M. Bruntink, A. van Deursen, R. van Engelen, and T. Tourwe, "On the Use of Clone Detection for Identifying Crosscutting Concern Code," IEEE Transactions on Software Engineering 31 (10), 804-818, 2005. [16].Y. Higo, and S. Kusumoto, "Code Clone Detection on Specialized PDGs with Heuristics," in European Conference on Software Maintenance and Reengineering, Oldenburg, pp. 75-84, 2011. [17].R. M. Karp, and M. O. Rabin, "Efficient randomized pattern-matching algorithms," in IBM Journal of Research and Development, pp. 249-260, 1987. [18].M. J. Wise, "Yap3: Improved Detection of Similarities in Computer Program and other Texts," in Proceedings of the Twenty-seventh SIGCSE Technical Symposium on Computer Science Education, pp. 130-134, 1996. [19].V. Levenshtein, "Binary Codes Capable of Correcting Deletions, Insertions and Reversals," in Soviet Physics Doklady, pp. 707, 1966. [20].J. a. Mendes-Moreira, C. Soares, A. M. Jorge, and J. F. D. Sousa, "Ensemble Approaches for Regression: A survey," ACM Comput. Surv. pp. 10: 1-10: 40, 2012. [21].W. Yang, "Identifying Syntactic Differences Between Two Programs," in Software Practice and Experience 21 (7), pp. 739-755, 1991. [22].L. Jiang, G. Misherghi, Z. Su, and S. Glondu, "DECKARD: Scalable and Accurate Treebased Detection of Code Clones," in Proceedings of 29th International Conference on Software Engineering, Minneapolis, pp. 96-105, 2007.
|